Results 1 to 10 of about 167,764 (227)
Improved collision detection of MD5 with additional sufficient conditions
One application of counter-cryptanalysis is detecting whether a message block is involved in a collision attack, such as the detection of MD5 and SHA-1. Stevens and Shumow speeded up the detection of SHA-1 by introducing unavoidable conditions in message
Linan Fang +6 more
doaj +2 more sources
Marek’s Disease Virus (MDV) Meq Oncoprotein Plays Distinct Roles in Tumor Incidence, Distribution, and Size [PDF]
Marek’s disease (MD), characterized by the rapid onset of T-cell lymphomas in chickens, is caused by Mardivirus gallidalpha2, an oncogenic alphaherpesvirus commonly known as Marek’s disease virus (MDV).
Dharani K. Ajithdoss +3 more
doaj +2 more sources
В статті розглядаються сучасні методи кріптоаналізу хеш-функції MD5 з метою розкриття паролю та підробки цифрового підпису документу. Зроблені висновки відповідно до перспектив кріптоаналізу на сучасному технічному рівні та наведені рекомендації до ...
Гугнин, Владимир Николаевич +1 more
core +4 more sources
DIGITAL SIGNATURE PADA CITRA MENGGUNAKAN RSA DAN VIGENERE CIPHER BERBASIS MD5
Salah satu teknik yang populer untuk mengamankan data dengan tingkat keamanan yang tinggi yaitu kriptografi. Berbagai penelitian telah dilakukan dengan menggabungkan kunci simteris dan kunci asimteris untuk mendapatkan keamanan ganda.
Lekso Budi Handoko +3 more
doaj +3 more sources
تحسين خوارزمية MD5 بالاعتماد على عدة طرق
المستخلص خوارزميات Hash هي الجزء المهم في العديد من تطبيقات التشفير والبروتوكولات الأمنية . هذا البحث يعمل على تعزيز خوارزميةMD5 ضد بعض الهجمات. التطوير الذي تم اعتماده في تحسين خوارزمية MD5 هو استخدام DNA coding ، والمعادلات الغير خطية (NLFSR ...
علاء فرحان +1 more
doaj +2 more sources
Influence of Training Load on Muscle Contractile Properties in Semi-Professional Female Soccer Players Across a Competitive Microcycle: A Pilot Study [PDF]
This study aimed to evaluate changes in muscle contractile properties during a training microcycle in semi-professional female football players and explore their relationship with training load variables.
Ezequiel Rey +4 more
doaj +2 more sources
Design and implementation of an ASIP-based cryptography processor for AES, IDEA, and MD5
In this paper, a new 32-bit ASIP-based crypto processor for AES, IDEA, and MD5 is designed. The instruction-set consists of both general purpose and specific instructions for the above cryptographic algorithms. The proposed architecture has nine function
Karim Shahbazi +2 more
doaj +2 more sources
Add "Salt" MD5 Algorithm’s FPGA Implementation
Abstract At present, the MD5 algorithm in network security of got to a wide range of applications in many respects, but in be used actually face being hit by a "rainbow table" library of security risks, this design adopts the method of "salt", based on the proposed encryption definitely added to the random Numbers to reduce the risk.
Ye Tian +4 more
openaire +2 more sources
Key Change Strategies for TCP-MD5
The TCP-MD5 option is most commonly used to secure BGP sessions between routers. However, changing the long-term key is difficult, since the change needs to be synchronized between different organizations. We describe single-ended strategies that will permit (mostly) unsynchronized key changes.
Steven M. Bellovin
openaire +4 more sources

